Cryptologia
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Plausible Deniability Using Automated Linguistic Stegonagraphy
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Hiding Data in the OSI Network Model
Proceedings of the First International Workshop on Information Hiding
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
ISC '01 Proceedings of the 4th International Conference on Information Security
Investigator's Guide to Steganography
Investigator's Guide to Steganography
Proceedings of the 2006 ACM symposium on Applied computing
A New Approach to Persian/Arabic Text Steganography
ICIS-COMSAR '06 Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
Graphstega: Graph Steganography Methodology
Journal of Digital Forensic Practice
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
Is image steganography natural?
IEEE Transactions on Image Processing
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
Headstega: e-mail-headers-based steganography methodology
International Journal of Electronic Security and Digital Forensics
Sumstega: summarisation-based steganography methodology
International Journal of Information and Computer Security
IH'11 Proceedings of the 13th international conference on Information hiding
Edustega: an Education-Centric Steganography methodology
International Journal of Security and Networks
Jokestega: automatic joke generation-based steganography methodology
International Journal of Security and Networks
Hi-index | 0.00 |
Steganography is the science and art of covert communications. When using a steganographic approach, if an adversary suspects the existence of a hidden message the approach is defeated regardless of whether or not a plaintext is revealed. Contemporary steganography approaches found in the literature often hide data by altering a text, image, audio, etc., that serves as a cover. Although, an alteration is still considered a noise that is introduced to the cover, a sender opts to make the alterations look subtle and hard to detect, in order to avert suspicion. However, recent advances in steganalysis have rendered these approaches highly vulnerable to a wide variety of attacks such as traffic, contrast, comparison, statistical, etc., which may be able to defeat the steganographic goal. This article promotes a new paradigm for covert communication, namely noiseless steganography paradigm (Nostega), that overcomes the vulnerabilities of current approaches. Nostega neither hides data in a noise nor produces noise, rendering the generated cover noiseless. Instead, it camouflages messages in a form of unquestionable data in the generated cover. Unlike all other approaches, Nostega not only camouflages a message but also its transmission. Examples of Nostega-based steganography methodologies are discussed.